Cyber Risk Analytics Management - QOMPLX
  • Products
    Identity Threat Detection and Response (ITDR) Prevent, detect and respond to identity threats in real-time Learn more
    Privilege Assurance
    Identity Assurance
    Managed Detection and Response Cost-effective cybersecurity for small to medium-sized firms Learn more
    Attack Surface Monitoring Discover cyber vulnerabilities and size of your attack surface Learn more
    Q:SCAN
    Third Party
    White Paper

    ManyKatz: How Active Directory Hacks Went Mainstream

    Read more
  • Services
    Offensive Security Services Gain a hacker’s perspective on your network
    Active Directory Security Assessment Identify and mitigate AD security risks to your network
    vCISO On-demand cybersecurity experts
  • Resources
    Blog Check out important cybersecurity topics and the QOMPLX perspective Learn more
    Content hub Research thought leadership, product benefits, use cases, and more Learn more
    Case studies
    Data sheets
    Overviews
    Tech specs
    Videos
    Webinars
    Whitepapers
    Data Sheet

    QOMPLX Privilege Assurance AD data sheet

    Read more
  • Partners
  • Company
    About QOMPLX Gain unified visibility into cyber risks & trust in identity
    Events Want to meet QOMPLX? View our list of upcoming events and trade shows
    Newsroom Research current news about QOMPLX
    Contact Us Discuss your firm’s cyber challenges with an expert
    White Paper

    Aite Impact Brief: Fixing Vulnerabilities in Active Directory and Kerberos

    Read more
    • Login
    • Request a meeting
    • Request a demo
QOMPLX KNOWLEDGE: What Are AS-REP Roasting Attacks?
Blog

QOMPLX KNOWLEDGE: What Are AS-REP Roasting Attacks?

In this latest addition to our QOMPLX Knowledge series we discuss AS-REP Roasting attacks, takes advantage of a known weakness in the Kerberos protocol that can be exploited during initial authentication with a Key Distribution Center (KDC).
Oct 22, 2020 — 4 min read
Ransomware's Effects Linger Long After Attack, Study Finds
Blog

Ransomware's Effects Linger Long After Attack, Study Finds

As ransomware attacks spread to more, high profile firms, a new report by the security firm Sophos suggests that the impact of such incidents lingers within organizations long after the malware has been removed.
Oct 15, 2020 — 2 min read
simulation modeling icon
Blog

Simulation Modeling

Simulation model builder tool with experiments and scenario exploration capabilities, based on agent-based and discrete-event simulation paradigms.
Oct 2, 2020
algorithm development icon
Blog

Algorithm Development

Easy-to-use toolkit for configuring, training, validating, serving and monitoring complex machine-learning or other models.
Oct 2, 2020
workflow automation icon
Blog

Workflow Automation

Robust automation of existing, multi-stage and complex, data processing and quantitative analysis using orchestration pipelines and rule-based workflows.
Oct 2, 2020
data visualization icon
Blog

Data Exploration and Visualization

Notebook-supported data exploration and dashboard-based visualization capabilities for quantitative analysis and business intelligence. Uncover data trends, detect anomalies, and analyze results, through configurable and intuitive interfaces that display actionable content.
Oct 2, 2020
Qomplx

QOMPLX harnesses data to provide unified visibility into cyber risks and trust in identity.

  • Products
    • Identity Threat Detection and Response (ITDR)
    • Managed Detection and Response
    • Attack Surface Monitoring
  • Services
    • Offensive Security Services
    • Active Directory Security Assessment
    • vCISO
  • Resources
    • Blog
    • Content hub
    • Case studies
    • Data sheets
    • Overviews
    • Tech specs
    • Videos
    • Webinars
    • Whitepapers
  • Company
    • About QOMPLX
    • Newsroom
    • Events
    • Contact Us
    • Request a demo
    • Vulnerability Disclosure Policy

© 2023 QOMPLX. All Rights Reserved.

Privacy Policy Terms of Use Sitemap